Leading free and open-source face recognition system
☆29Nov 27, 2025Updated 4 months ago
Alternatives and similar repositories for CompreFace
Users that are interested in CompreFace are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 6 years ago
- A puppet manager for NationStates.☆12Dec 25, 2024Updated last year
- PHP Cookie Stealing Scripts for use in XSS☆28Jul 26, 2018Updated 7 years ago
- KrbRoastParser is a tool for parsing Kerberos packets from pcap files to extract AS-REQ, AS-REP and TGS-REP hashes☆98Mar 26, 2026Updated 3 weeks ago
- GNURadio stereo FM receiver and RDS decoder☆47Aug 25, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CSharp Obfuscator protects your .NET application code through obfuscation transforms, while maintaining debugging abilities for quality a…☆49Apr 26, 2022Updated 3 years ago
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆63Aug 1, 2023Updated 2 years ago
- Custom Metasploit logos☆54Nov 13, 2021Updated 4 years ago
- #Spam Telepon☆54May 17, 2020Updated 5 years ago
- Rebbletool - the reborn version of the pebble command line tool, modified to work on modern systems and with python3☆75Nov 4, 2025Updated 5 months ago
- A package designed for efficient face recognition across extensive photo collections, optimized for large-scale processing.☆70Sep 14, 2024Updated last year
- Bluekeep(CVE 2019-0708) exploit released☆107Sep 24, 2019Updated 6 years ago
- Router Keygen generate default WPA/WEP keys for several routers.☆98Sep 17, 2021Updated 4 years ago
- Advanced Android AV Evasion Tool Written In Python 3 that can Embed/Bind meterpreter APK to any Legitimate APK☆296May 15, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆485Jul 9, 2024Updated last year
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆683Nov 9, 2023Updated 2 years ago
- Free, libre, effective, and data-driven wordlists for all!☆650Sep 10, 2021Updated 4 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆721Aug 5, 2020Updated 5 years ago
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆1,019Nov 7, 2021Updated 4 years ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆943Mar 29, 2022Updated 4 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,112May 29, 2024Updated last year
- Active Directory Integrated DNS dumping by any authenticated user☆1,152Apr 4, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Literally, the perfect injector.☆982Apr 13, 2023Updated 3 years ago
- A python based tool for exploiting and managing Android devices via ADB☆889Mar 12, 2023Updated 3 years ago
- Security Apps for Android☆1,046Feb 21, 2024Updated 2 years ago
- Transparent proxy through Tor for Kali Linux OS☆1,216Apr 18, 2024Updated 2 years ago
- Transformers-compatible library for applying various compression algorithms to LLMs for optimized deployment with vLLM☆3,097Updated this week
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,154Apr 10, 2026Updated last week
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,312Feb 15, 2026Updated 2 months ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆2,145Nov 28, 2024Updated last year
- An engine to make Tor network your default gateway☆2,318Updated this week
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Converts PE into a shellcode☆2,751Aug 30, 2025Updated 7 months ago
- UAC bypass, Elevate, Persistence methods☆2,739Feb 13, 2023Updated 3 years ago
- A OSINT tool to obtain a target's phone number just by having his email address☆2,624Jul 26, 2024Updated last year
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,219Aug 7, 2025Updated 8 months ago
- Windows Exploit Suggester - Next Generation☆4,823Updated this week
- Automated Mass Exploiter☆5,228May 22, 2023Updated 2 years ago
- Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.☆5,070Apr 25, 2024Updated last year